10 More Discussions You Might Find Interesting
1. AIX
I have searched this quite a long time but couldn't find the right method for me to use. I need to assign read write permission to the user for specific directories and it's sub directories and files. I do not want to use ACL. I do not want to assign user the same group of that directories too.... (0 Replies)
Discussion started by: blinkingdan
0 Replies
2. UNIX and Linux Applications
Hi all,
Please help me solving the error that i get when i trigger the job from autosys. The job is failing after going to restart start and it is throwing an "exit code:128". Please help me understand whats this exit code and how to overcome this. And when i check the logs its giving me an... (4 Replies)
Discussion started by: Bharath V
4 Replies
3. Shell Programming and Scripting
hi,
i am new in unix.......i am using bash and i want to create a user which has only some command and scripts permission.........is it possible?
thanx (1 Reply)
Discussion started by: rakeshtomar82
1 Replies
4. UNIX for Dummies Questions & Answers
Hi all,
I have to grant sudo permission to a user.
I have searched online and find that /etc/sudoers file needs to be changed with visudo command. As i am new to linux, this is not clear to me. Can anybody take an example and show me how exactly this done.
Thanks in advance! (2 Replies)
Discussion started by: lramsb4u
2 Replies
5. UNIX for Dummies Questions & Answers
I created a new user and changed their home directory to /export/home/mydir/ I verified in the passwd file that the home directory is set to the above and that owner of that directory is the new user and yet when I log in as that user I get the following message:
No directory! Logging in with... (14 Replies)
Discussion started by: some_one
14 Replies
6. AIX
Hi all,
I am a beginner in AIX. I am facing a problem with remote printing in AIX.
HP laser jet 1320 printer is connected to a printer server (PCI Mini - 100U3), which is configured as remote printer from AIX server.
But I am not able to print from the AIX server by using "lp -d... (0 Replies)
Discussion started by: Rainy
0 Replies
7. AIX
When we as normal user try to login, the session startup terminates and we are presented with the login screen.The root user is able to login without any problem.I can log in to the Aix server as normal user through telnet & using xmanager but not directly through server terminal .The Aix version... (1 Reply)
Discussion started by: ranadeep
1 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I'm one of a server administrators. I've the linux root account but I don't know the root password of MySQL (Server version: 5.0.32). I want to GRANT ALL PRIVILEGES to my MySQL account without changing the MySQL's root password. How can I do so? (0 Replies)
Discussion started by: mjdousti
0 Replies
9. AIX
Hi,
Am jus trying to find the Total RAM Size of a AIX m/c (in MB)..svmon works perfectly for a superuser...But i want to achive this as a normal user...Please help me out with correct command..
Best Regards,
Muthukumaran.M (3 Replies)
Discussion started by: muthukumaran13
3 Replies
10. UNIX for Advanced & Expert Users
Hi all,
I am using Sun Solaris 9 .In this system normal users unable to create files from the command line.I added these users in bin,adm and even root group i found them unable to create a file. (1 Reply)
Discussion started by: mallesh
1 Replies
Commands Reference, Volume 1, a - c
acledit_Command
Purpose
Edits the access control information of a file.
Syntax
acledit [ -t ACL_type ] [ -v ] FileObject
Description
The acledit command lets you change the access control infor-
mation of the
file specified by the FileObject parameter. The command dis-
plays the
current access control information and lets the file owner
change it with
the editor specified by the EDITOR environment variable. Be-
fore making any
changes permanent, the command asks if you want to proceed.
Note:
The EDITOR environment variable must be specified with a com-
plete path
name; otherwise, the acledit command will fail. The maximum
size of the
ACL data is dependent on the ACL type.
The access control information displayed depends on the ACL
type
associated with the file system object. Information typically
includes
access control entries displayed for owner and others. Also,
file mode
bits associated with the object could be displayed.
The following is an example of the access control information
of a file:
attributes: SUID
base permissions:
owner (frank): rw-
group (system): r-x
others : ---
extended permissions:
enabled
permit rw- u:dhs
deny r-- u:chas, g:system
specify r-- u:john, g:gateway, g:mail
permit rw- g:account, g:finance
Note: If the acledit command is operating in a trusted path,
the editor
must have the trusted process attribute set.
Flags
This optional input specifies the ACL type in which the ACL
data will
be stored at the end of the ACL editing process. If no op-
tion is
specified, then the ACL currently associated with the file
system
object will be edited in its ACL type format. If an ACL
type is
-t specified with this flag, then it is assumed that user is
trying to
modify the current ACL type and store the ACL in a new ACL
type format.
When this flag is specified and the ACL type does not match
the type
that exists currently, it is expected that user will modify
the
contents of the ACL data to format into the new ACL type
specific
format before saving.
Displays the ACL information in Verbose mode. Comment lines
will be
added to explain more details about the ACL associated with
the FS
-v object. These comment lines are generated when the command
is executed
and do not reside anywhere persistently. Hence, any modifi-
cations to
the same will be lost when acledit is exited.
Security
Access Control: This command should be a standard user command
and have
the trusted computing base attribute.
Files Accessed:
Mode File
x /usr/bin/aclget
x /usr/bin/aclput
Auditing Events: If the auditing subsystem has been properly
configured
and is enabled, the acledit command will generate the follow-
ing audit
record (event) every time the command is executed:
Event Information
FILE_Acl Lists access controls.
See "Setting up Auditing" in Security for more details about
how to
properly select and group audit events, and how to configure
audit event
data collection.
Examples
To edit the access control information of the plans file, en-
ter:
acledit plans
Files
/usr/bin/acledit Contains the acledit command.
Related Information
The aclget command, aclput command, auditpr command, chmod
command.
Access control lists in Operating system and device manage-
ment.
The Auditing Overview in Security explains more about audits
and audit
events.
For more information about the identification and authentica-
tion of users,
discretionary access control, the trusted computing base, and
auditing,
refer to Securing the network in Security.
________________________________________________________________________________
Commands Reference, Volume 1, a - c
acledit_Command
Purpose
Edits the access control information of a file.
Syntax
acledit [ -t ACL_type ] [ -v ] FileObject
Description
The acledit command lets you change the access control infor-
mation of the
file specified by the FileObject parameter. The command dis-
plays the
current access control information and lets the file owner
change it with
the editor specified by the EDITOR environment variable. Be-
fore making any
changes permanent, the command asks if you want to proceed.
Note:
The EDITOR environment variable must be specified with a com-
plete path
name; otherwise, the acledit command will fail. The maximum
size of the
ACL data is dependent on the ACL type.
The access control information displayed depends on the ACL
type
associated with the file system object. Information typically
includes
access control entries displayed for owner and others. Also,
file mode
bits associated with the object could be displayed.
The following is an example of the access control information
of a file:
attributes: SUID
base permissions:
owner (frank): rw-
group (system): r-x
others : ---
extended permissions:
enabled
permit rw- u:dhs
deny r-- u:chas, g:system
specify r-- u:john, g:gateway, g:mail
permit rw- g:account, g:finance
Note: If the acledit command is operating in a trusted path,
the editor
must have the trusted process attribute set.
Flags
This optional input specifies the ACL type in which the ACL
data will
be stored at the end of the ACL editing process. If no op-
tion is
specified, then the ACL currently associated with the file
system
object will be edited in its ACL type format. If an ACL
type is
-t specified with this flag, then it is assumed that user is
trying to
modify the current ACL type and store the ACL in a new ACL
type format.
When this flag is specified and the ACL type does not match
the type
that exists currently, it is expected that user will modify
the
contents of the ACL data to format into the new ACL type
specific
format before saving.
Displays the ACL information in Verbose mode. Comment lines
will be
added to explain more details about the ACL associated with
the FS
-v object. These comment lines are generated when the command
is executed
and do not reside anywhere persistently. Hence, any modifi-
cations to
the same will be lost when acledit is exited.
Security
Access Control: This command should be a standard user command
and have
the trusted computing base attribute.
Files Accessed:
Mode File
x /usr/bin/aclget
x /usr/bin/aclput
Auditing Events: If the auditing subsystem has been properly
configured
and is enabled, the acledit command will generate the follow-
ing audit
record (event) every time the command is executed:
Event Information
FILE_Acl Lists access controls.
See "Setting up Auditing" in Security for more details about
how to
properly select and group audit events, and how to configure
audit event
data collection.
Examples
To edit the access control information of the plans file, en-
ter:
acledit plans
Files
/usr/bin/acledit Contains the acledit command.
Related Information
The aclget command, aclput command, auditpr command, chmod
command.
Access control lists in Operating system and device manage-
ment.
The Auditing Overview in Security explains more about audits
and audit
events.
For more information about the identification and authentica-
tion of users,
discretionary access control, the trusted computing base, and
auditing,
refer to Securing the network in Security.